Skip to main content

CVE-2025-6560: CWE-256 Plaintext Storage of a Password in Sapido BR071n

Critical
VulnerabilityCVE-2025-6560cvecve-2025-6560cwe-256
Published: Tue Jun 24 2025 (06/24/2025, 02:01:22 UTC)
Source: CVE Database V5
Vendor/Project: Sapido
Product: BR071n

Description

Multiple wireless router models from Sapido have an Exposure of Sensitive Information vulnerability, allowing unauthenticated remote attackers to directly access a system configuration file and obtain plaintext administrator credentials.  The affected models are out of support; replacing the device is recommended.

AI-Powered Analysis

AILast updated: 06/24/2025, 02:54:44 UTC

Technical Analysis

CVE-2025-6560 is a critical vulnerability affecting multiple wireless router models from Sapido, specifically the BR071n model. This vulnerability is categorized under CWE-256, which pertains to the plaintext storage of passwords. The core issue is that these routers store administrator credentials in a system configuration file in plaintext format. Due to improper access controls, unauthenticated remote attackers can directly access this configuration file over the network without any authentication or user interaction. This allows attackers to obtain the administrator username and password in clear text, granting them full administrative control over the device. The vulnerability has a CVSS 4.0 base score of 9.3, indicating a critical severity level. The attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and no scope change (S:U). The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), meaning that an attacker can fully compromise the device, manipulate configurations, intercept or redirect network traffic, and potentially use the device as a foothold for further attacks within the network. The affected devices are out of support, and no patches are available, making replacement the recommended remediation. No known exploits are currently reported in the wild, but the ease of exploitation and severity make this a high-risk vulnerability for any environment still using these devices.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for small and medium enterprises or home office environments that may still use Sapido BR071n routers due to cost or legacy reasons. Compromise of the router’s administrator credentials allows attackers to alter network configurations, intercept sensitive communications, deploy malicious firmware, or pivot into internal networks. This can lead to data breaches, disruption of business operations, and loss of trust. Critical infrastructure sectors relying on these devices for network connectivity could face operational disruptions or espionage risks. Since the vulnerability requires no authentication or user interaction, attackers can scan for vulnerable devices and exploit them remotely, increasing the risk of widespread compromise. The lack of vendor support and patches exacerbates the risk, as organizations cannot remediate the vulnerability through software updates, forcing reliance on device replacement or network segmentation strategies.

Mitigation Recommendations

Given the absence of available patches and the end-of-life status of the affected Sapido BR071n routers, the primary mitigation is to replace these devices with modern, supported routers from reputable vendors that follow secure credential storage practices. Until replacement is possible, organizations should implement strict network segmentation to isolate vulnerable devices from critical assets and sensitive data. Deploying network-level access controls such as firewall rules to restrict inbound management access to trusted IP addresses can reduce exposure. Monitoring network traffic for unusual access patterns or configuration file downloads can help detect exploitation attempts. Additionally, organizations should review and update their asset inventories to identify any remaining Sapido BR071n devices. If replacement is delayed, consider disabling remote management features on these routers and changing default credentials where possible, although this may not fully mitigate the plaintext credential exposure. Finally, educating users about the risks of legacy devices and enforcing policies to phase out unsupported hardware will reduce future risks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
twcert
Date Reserved
2025-06-24T01:24:45.808Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 685a0febdec26fc862d8d936

Added to database: 6/24/2025, 2:39:39 AM

Last enriched: 6/24/2025, 2:54:44 AM

Last updated: 8/15/2025, 4:27:18 PM

Views: 39

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats